<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: msuser</title><link>https://news.ycombinator.com/user?id=msuser</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 14 May 2026 16:28:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=msuser" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by msuser in "YellowKey Bitlocker Bypass Vulnerability"]]></title><description><![CDATA[
<p>Point taken, but I would call this an authentication bypass (i.e. you can become administrator without any credentials) instead of a BitLocker bypass. It looks like at most, having BitLocker turned on is a requirement to trigger the bug/backdoor.<p>In any case I'd be very curious to read a response to these findings from someone at Microsoft.</p>
]]></description><pubDate>Wed, 13 May 2026 18:22:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=48125525</link><dc:creator>msuser</dc:creator><comments>https://news.ycombinator.com/item?id=48125525</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48125525</guid></item><item><title><![CDATA[New comment by msuser in "YellowKey Bitlocker Bypass Vulnerability"]]></title><description><![CDATA[
<p>How is this a backdoor if one of the steps is to reboot the system while holding down SHIFT? To boot in the first place, the drive needs to be unlocked.</p>
]]></description><pubDate>Wed, 13 May 2026 14:04:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=48122060</link><dc:creator>msuser</dc:creator><comments>https://news.ycombinator.com/item?id=48122060</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48122060</guid></item></channel></rss>